Items Tagged with "Training"


B09c361cbdc6cf629affdc7db30a186d

Security BSides Detroit Announces its June Schedule

May 15, 2012 Added by:Steven Fox, CISSP, QSA

The BSides conference is billed as a un-conference where practitioners go for clear unfiltered view of the industry. The conference features two tracks and thirty-two talks of local and national experts on a variety technical and non-technical subjects...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

FBI Guidance of Combating the Insider Threat

May 15, 2012 Added by:Infosec Island Admin

The thief who is harder to detect and who could cause the most damage is the insider — the employee with legitimate access. They may steal solely for personal gain or be a “spy”—someone who is stealing company information or products in order to benefit another organization or country...

Comments  (0)

53692ae1a8e713373b8a487ce89ee3e2

Are We Reaching Security Conference Overload?

May 13, 2012 Added by:Tom Eston

We have more security and hacking conferences than ever, but now there is also more overlap. These choices can make it harder for researchers to present new and relevant content and also tough to decide which conferences to attend from a attendee perspective...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

BSides London and Infosec Europe 2012

May 11, 2012

So I guess the one thing you can take away from it all is that if you want to speak to CISO’s and heads of security or other high-flying execs, the easiest way to do so is get yourself a camera, a microphone and a press pass to an event and they will be like putty in your hands...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Webinar: Keeping Your Open Source Software Secure

May 09, 2012 Added by:Infosec Island Admin

Understand why collaboration is invaluable in keeping proprietary systems secure. Learn how to share private information in public forums without harming your organization. Identify what tools are available to your organization for collaboration, notification, and knowledge-sharing...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

CISSP Reloaded Domain 7: Applications and Systems Development

May 08, 2012 Added by:Javvad Malik

Secure applications aren’t the result of evolution or chance conditions coming together. Secure applications are only created with a definite degree of intelligent design. You, as the security person are responsible for providing that intelligent design into the application...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Island Seeks Industry Partners for Security Conferences

May 07, 2012 Added by:Infosec Island Admin

Through a combination of custom content publication that features products and services, video interviews with company personnel onsite, and traditional banner ad campaigns, organizations can better leverage the impact of attendance and participation at key industry events...

Comments  (0)

09dae715e355968a0e90ebddf038ad56

Hacking-Kung Fu: Aims and Objectives Part 2

May 06, 2012 Added by:Quintius Walker

A major aim of Kung-Fu Hacking training is System Security - or more so being able to secure your own systems. This ability to defend ourselves is a general asset, and has long-term benefits as more and more vulnerabilities become exploitable to the general public...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

Fear and Loathing in Infosec: The Black Mass

May 02, 2012 Added by:Infosec Island Admin

Gesticulating and making odd sounds, the hackers milled and jerked around like some strange species of black raptors. Babbling incoherently about arcane knowledge in the hopes of one upping the other hapless technoweens in the room....

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Warriors Shine in NSA Competition

May 01, 2012 Added by:Headlines

During the competition, NSA network specialists and military network experts formed the red cell team that challenged cadet blue cell teams to defend a closed-computer network that the cadets designed, built and configured at their respective academies...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

National Collegiate Cyber Defense Competition (NCCDC)

May 01, 2012 Added by:Infosec Island Admin

"The Department of Homeland Security is proud to be one of the sponsors of this competition that took place over the course of three days and focused on the operational aspects of securing and defending a 'commercial' network infrastructure..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA: Cyber Exercise Stocktaking Survey

April 30, 2012 Added by:Infosec Island Admin

As cyber crises occur on larger scales, managing them effectively requires international cooperation. ENISA would like to take stock of national and international cyber exercise efforts worldwide. The result of this project will be a global map of cyber exercises...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Experts Talk Security Awareness: Black Hat EU 2012 Finale

April 30, 2012

At Black Hat Europe 2012, we asked the experts for their views on the importance of user security awareness training and what the common issues are with such initiatives. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: What does a Cyber Attack Feel Like?

April 26, 2012 Added by:Infosec Island Admin

The free ICS Advanced Cybersecurity training offers step-by-step guidance on network discovery, exploitation, defense, and detection. After the 3 full days of classroom instruction participants are armed with an arsenal of cyber attack and defense tools and techniques...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

On the Sustainability of Information Security

April 25, 2012 Added by:Rafal Los

The only way that information security can be a group of outliers is if we're considering ourselves within the entirety of the IT realm. While this would be great for my ego to think that myself and all my peers are just smarter than everyone else in IT, I know this to be false...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force Wins NSA's 12th Annual Test of Cyber Defense

April 25, 2012 Added by:Headlines

The cybersecurity skills and ingenuity of students from the U.S. service academies, the Air Force Institute of Technology, and the Royal Military College of Canada were put to the test by the National Security Agency's top information assurance professionals...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »